Listen up, This is Their Story.

In this ITSPmagazine section, Their Story, you'll find individuals explaining things such as: why they value their work; what their peers do every day to help protect our privacy; what moves them as an information security professional, and how their products, services and solutions can be used to make a positive impact on how we live our lives and do our jobs.

The articles and podcasts presented in this section are provided to ITSPmagazine by a variety of organizations and associations. Their Story submissions should come with a goal to help educate the market and explain their individual role – and that of their company's – as it sits at the intersection of IT Security & Society.

To be completely transparent with you, please be aware that you could very well read the content captured in these posts as promotional in nature. We mention this so that you're not surprised by it. While we remain completely neutral in other areas of the publication, We believe it is OK for this type of content to be presented in this part of the magazine, as long as A) the reader is aware, B) the articles are well written and the podcasts are well produced, and C) we all learn a little something from these folks and their companies.

Now it comes in webcast format too. Explore more about this opportunity.

Today’s guests are Paul Hsu, Senior Product Marketing Manager at Nintex, and Dan Puterbaugh, Director or Strategic Development at Adobe. They are going to tell us some stories about business process management and the value of integrating digital signatures into business workflows.

Dan and Paul share some of the everyday use cases where digital signatures are a valuable part of the business workflows. The ultimate goal is to enable line of business owners to be more agile and self-manage their business processes to meet their needs best – let them become the best form of themselves instead of relying on IT to stand up a process to let them do their job.

In this Their Story article, Max Aulakh, CEO of Ignyte Assurance Platform, discusses how they help clients navigate the complex process of compliance management using innovative new technology and natural language processing. They can also assist with cyber risk management, vendor management and business continuity management. Ignyte is leading the industry in a shift from just a singular focus on Governance, Risk and Compliance (GRC) to a more holistic approach called Integrated Risk Management (IRM).

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Keenan Skelly, Circadence VP of Global Partnerships & Security Evangelist, for a fascinating conversation on cybersecurity learning, training and assessment through their Ares and Orion products — as well as women in cybersecurity and how as an industry we need to better engage and develop this important resource.

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Shauna Park, DataLocker’s Director of Channel Sales, to discuss their solution set, and walk through how industries such as healthcare, financial services and even Hollywood are taking advantage of encrypted storage. We’ll even get a sneak peek into how use cases involving the cloud will come to be supported.

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Mike Vanoverbeke, SecureData’s Director of Product Management, to talk about portable secure storage and how it fits in with today’s modern business.

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Cathy Allen of the Santa Fe Group to discuss how third-party risk has evolved with and around the growth in malicious hacking, the changing makeup and thinking across boards of directors, the importance of diversity (including the relationship between AI and diversity), and how well-thought-out tools assist with risk assessments.

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Mickey Bresman, CEO at Semperis, to discuss the difficulty that normal Active Directory upgrades, restores and backups, let alone full-blown disaster recovery, can cause – and how Semperis has a solution that promises to change all of that.

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Larry Link & Shreyans Mehta from Cequence, a silicon valley startup who is applying real-time network analysis, machine learning, threat intelligence, and behavioral analytics to accurately detect and mitigate bot attacks without affecting legitimate user traffic. Listen in to hear more!

During RSA Conference 2019 in San Francisco, Sean Martin stops by the Edgescan booth to chat with the company’s co-founders, Eoin Keary and Rahim Jina. The conversation was driven mainly by their latest vulnerability stats report which was just released.

ITSPmagazine’s John Dasher sat down at RSA Conference with George Wrenn, CEO and Founder of CyberSaint. Imagine if you were told that your organization must demonstrably adopt a cybersecurity framework and show compliance in order to secure new business or, perhaps more frustratingly, retain a contract you’ve already won. Listen in to hear more!

ITSPmagazine’s John Dasher sat down at RSA Conference with Samantha Madrid of Juniper Networks to chat about leveraging the infrastructure you already have to protect you from unknown threats. Sound far-fetched? Hear how Juniper is applying insight gleaned through behavior intelligence to areas such as wireless network usage.

ITSPmagazine’s John Dasher sat down at RSA Conference with Colin Bastable, CEO of Lucy Security to talk about how the bad guys plan and set up infrastructure to carry out their attacks, and how transparency with employee behavior and their progress with respect to awareness training is vital.

During our conversation, Bugcrowd’s Casey Ellis and Jason Haddix share some of their recent news with us — including their Buggy Awards, v2 of their Traffic Control capabilities, and their new partnership with Secure Code Warrior, designed to help educate and train engineers as part of the ongoing development lifecycle, shifting the InfoSec training left in the SDLC.

The organization telling us their story today is Humio. Humio are headquartered in Denmark and are focused on providing real-time access to data via live system observability through fast, scalable and efficient log data management.

Our guests from Humio are Geeta Schmidt, CEO of Humio, and Pieter Heyn, Director of Sales & Alliances for the UK & Ireland at Humio. Each share their individual stories for how they entered the InfoSec arena before walking us through some of the trends they are seeing in the market, how they are building a solution to support those trends, and how their culture, solution development process, and customer interaction model are designed to establish trust and ensure that a simple, common mission is achieved.

It’s time to manage risk and vulnerabilities throughout the organization. But, how does your risk and vulnerability data flow and where does it land when it comes to educating the right people that a critical item needs to be addressed? Sean Martin connects with Dearbhail Kirwan and David Kennefick from Edgescan to look at software development lifecycles, risk management, vulnerability management, and the use of well-defined processes, integrated tools, and automated workflows to improve communications throughout the organization.

ITSPmagazine recently caught up with the CEO at Cequence Security, Larry Link. With co-founders coming from some of the largest cybersecurity companies in the world, the team at Cequence is laser-focused on stopping the growing number of malicious bot attacks.

ITSPmagazine’s John Dasher sat down at Black Hat 2018 with Willy Leichter, Vice President of Marketing at Virsec to talk about Virsec’s unique approach to security and how it protects enterprises from advanced memory-based attacks, fileless attacks, and other subtle, insidious attacks at near 100% accuracy.

In Part 3 of this "Their Story" podcast, Valimail's Alexander Garcia-Tobar chats with ITSPmagazine's John Dasher about some of the challenges organizations face as they make a move toward a world of email authentication along with some tips for how they can make forward progress against those challenges.

ITSPmagazine's Selena Templeton sat down with Dena Haritos Tsamitis of Carnegie Mellon University to capture CMU’s story (which was among the first institutions in the world to create a degree program for cybersecurity). They also chat about the Information Networking Institute (INI) and Women@INI (WINI), Cylab (CMU's security and privacy research institute), MySecureCyberspace, diversity and inclusion, and imposter syndrome.

ITSPmagazine’s John Dasher chats with Dana Tamir of Silverfort at Black Hat 2018 about multi-factor authentication, how it’s changed with the shift to the cloud, hybrid environments and disappearing perimeters, and how Silverfort enables strong MFA across the entire network without modifications to endpoints and servers.

ITSPmagazine’s John Dasher chats with Nick Bilogorskiy from Juniper Networks at Black Hat 2018 about malware, ransomware, new cryptocurrency attacks (“crypto jacking”) and how Juniper can help protect you by keeping your network clean and clear.

ITSPmagazine’s John Dasher had the chance to sit down with Tal Guest of Bomgar at Black Hat 2018 to talk about Bomgar, Tal’s role there, and how the company specializes in privileged access management (PAM).

ITSPmagazine's John Dasher had a chance to sit down with Keenan Skelly, VP Global Partnerships & Security Evangelist at Circadence, at this year's Black Hat to capture Circadence’s story and chat about gamification and security, AI, cyber ranges, and women in cyber.

ITSPmagazine’s John Dasher chats with Brian Reed of NowSecure about their latest research that shows that using a top 50 mobile app from your favorite App Store probably has one or more critical vulnerabilities with a Common Vulnerability Scoring System (CVSS) score of 8 or higher. And we’re talking production apps from Fortune 500 companies here folks.

ITSPmagazine editor-in-chief Sean Martin sits down with Mordecai Rosen from CA Technologies to capture the latest story from him about what can be referred to as the "app economy." The app economy is driving the next generation of business transformation via digital means, but with these great opportunities comes an increased threat surface.

ITSPmagazine editor-in-chief Sean Martin reports on the 2018 Nintex xchange conference in San Diego. As the stories from these sessions illustrate, when it comes to ensuring compliance and protecting data in the cloud, an automated workflow such as those offered by Nintex offers a viable solution to solve the challenge.

ITSPmagazine’s John Dasher chats with Andy Smith from Centrify during RSA Conference 2018 in San Francisco to discuss how to enable enterprises to leverage and secure user identity across their on-prem and cloud infrastructure, applying machine learning to spot and act upon unwanted and insecure activity.

ITSPmagazine’s John Dasher chats with Ferruh Mavituna from Netsparker during RSA Conference 2018 in San Francisco to discuss how Netsparker is accelerating the enterprise’s ability to find and report web application vulnerabilities while confirming that they are not false positives.

ITSPmagazine’s John Dasher chats with Kunal Anand from Prevoty during RSA Conference 2018 in San Francisco to discuss what RASP (Runtime Application Self Protection) is and how a RASP solution can help organizations secure their applications and prioritize the processing of their vulnerability by simply attaching an agent to their app.